Page 152 - Agriculture Policy Wording Binder
P. 152
3.1 3.2
Firewalls implemented to restrict access to digitally stored Sensitive Information.
Anti-virus and/or anti-malware software implemented on all desktops, laptops and Sensitive Systems (where applicable and in accordance with best practice recommendations) and kept up to date per the software providers’ recommendations.
the use of a Computer System by an unauthorised person or persons or an authorised person in an unauthorised manner
the United States of America and/or Canada and/or their respective possessions or protectorates and/or any country operating under the laws of the United States of America or Canada
Cyber Insurance (Claims-made Basis)
Unauthorised Use
USA and/or Canada
Wrongful Act
the following acts committed, attempted or alleged on or after the Retroactive Date:
1. for purposes of coverage under Defined Events 1 and 2 any error, misstatement, misleading statement, act, omission, neglect, or breach of duty committed, attempted or allegedly committed or attempted by an Insured, with respect to its duties as such, or others acting on behalf of the Insured for whom the Insured is legally responsible, resulting in an actual or potential Privacy Breach or Network Security Breach;
2. for purposes of coverage under Defined Events 3 and 4 a Network Security Breach;
3. for purposes of coverage under Defined Events 5, a Cyber Extortion Threat
SPECIFIC CONDITIONS
1. Corporate acquisitions, mergers, amalgamations and takeovers
This Section does not cover any Company or other legal entity acquired during the period of insurance unless notified to and endorsed by the Company.
2. Loss of business income calculation
2.1 The calculation for Loss of Business Income to be based on:
2.1.1 revenues and costs generated during each month in the period in the preceding year corresponding to the Restoration Period;
2.1.2 reasonable projections of future profitability or otherwise, had no loss occurred;
2.1.3 all changes that would affect the future profits generated;
2.1.4 any savings or amounts recovered in connection with or as a result of a Network Security Breach; and
2.1.5 incidental benefits as a result of competitors suffering a related failure.
Requests for indemnity should be accompanied by the calculation described above, together with details of the calculation and the assumptions made. The Insured is obliged to produce any documentary evidence which the Company may require. The costs and expenses associated with investigating, preparing and submission of the request for indemnity shall be borne by the Insured.
2.2 The Insured shall afford the Company or an agent of the Company all reasonable assistance in their investigations. Any Loss of Business Income payments will, where applicable, be reduced by the extent to which the Insured:
2.2.1 uses damaged or undamaged Data;
2.2.2 makes use of available stock, merchandise or other Data; or
2.2.3 uses substitute facilities, equipment or personnel.
3. Minimum security requirements
It is a condition precedent to liability that in addition to its data and information security procedures as disclosed, the Insured undertakes to comply fully with the Company’s minimum IT security requirements as specified hereunder on commencement of and throughout the duration of this Section:
Page | 150
Policy Wording – Agriculture – Binder – Version 2 2023